Counterintelligence: Difference between revisions

Content deleted Content added
Citation bot (talk | contribs)
Alter: title. Add: edition, isbn. Removed proxy/dead URL that duplicated identifier. Removed parameters. | Use this bot. Report bugs. | Suggested by Whoop whoop pull up | #UCB_webform 1206/2173
Line 14:
== History ==
[[File:Great Game cartoon from 1878.jpg|thumb|Political cartoon depicting the Afghan [[Sher Ali Khan|Emir Sher Ali]] with his "friends" the [[Russian Bear]] and [[Lion|British Lion]] (1878). [[The Great Game]] saw the rise of systematic espionage and surveillance throughout the region by both powers]]
Modern tactics of espionage and dedicated government intelligence agencies developed over the course of the late-19th century. A key background to this development was [[The Great Game]] - the strategic rivalry and conflict between the British Empire and the Russian Empire throughout [[Central Asia]] between 1830 and 1895. To counter Russian ambitions in the region and the potential threat it posed to the British position in [[British India|India]], the [[Indian Civil Service]] built up a system of surveillance, intelligence and counterintelligence. The existence of this shadowy conflict was popularized in [[Rudyard Kipling]]'s famous [[espionage fiction|spy book]], ''[[Kim (novel)|Kim]]'' (1901), where he portrayed the Great Game (a phrase Kipling popularized) as an espionage and intelligence conflict that "never ceases, day or night".<ref>{{cite book|url= https://books.google.com/books?id=D3KIwYA_QyAC|title= Intelligence and Government in Britain and the United States: A Comparative Perspective|author= Philip H.J. Davies|year= 2012|publisher= ABC-CLIO|isbn= 9781440802812}}</ref>
 
The establishment of dedicated intelligence and counterintelligence organizations had much to do with the colonial rivalries between the major European powers and to the accelerating development of military technology. As espionage became more widely used, it became imperative to expand the role of existing police and internal security forces into a role of detecting and countering foreign spies. The ''[[Evidenzbureau]]'' (founded in the [[Austrian Empire]] in 1850) had the role from the late-19th century of countering the actions of the [[Pan Slavism|Pan-Slavist movement]] operating out of [[Serbia]].
Line 33:
|author= Calder Walton|year= 2013
|publisher= Overlook|pages = 5–6
|isbn= 9781468310436
}}
</ref>
Line 74 ⟶ 75:
| date = 2006-07-24
| access-date = 2007-11-05
|format=PDF}}</ref> The military has organic counterintelligence to meet specific military needs.
 
== Counterintelligence missions ==
Line 146 ⟶ 147:
| date = 2004-04-30
| access-date = 2007-11-03
|format=PDF}}</ref>
 
Terminology here is still emerging, and "transnational group" could include not only terrorist groups but also transnational criminal organization. Transnational criminal organizations include the drug trade, money laundering, extortion targeted against computer or communications systems, smuggling, etc.
Line 168 ⟶ 169:
Decision makers require intelligence free from hostile control or manipulation. Since every intelligence discipline is subject to manipulation by our adversaries, validating the reliability of intelligence from all collection platforms is essential. Accordingly, each counterintelligence organization will validate the reliability of sources and methods that relate to the counterintelligence mission in accordance with common standards. For other mission areas, the USIC will examine collection, analysis, dissemination practices, and other intelligence activities and will recommend improvements, best practices, and common standards.<ref name=NCIX>{{Cite web
| url = https://fas.org/irp/ops/ci/cistrategy2007.pdf
|format=PDF
| title = National Counterintelligence Executive (NCIX)
| year = 2007
Line 205:
| url = http://www.nps.edu/academics/sigs/nsa/publicationsandresearch/studenttheses/theses/gleghorn03.pdf
| access-date = 2007-11-02
|format=PDF}}</ref> Active countermeasures, whether for force protection, protection of intelligence services, or protection of national security interests, are apt to involve [[HUMINT#Basic HUMINT operations|HUMINT disciplines]], for the purpose of detecting FIS agents, involving screening and debriefing of non-tasked human sources, also called casual or incidental sources. such as:
* walk-ins and write-ins (individuals who volunteer information)
* unwitting sources (any individual providing useful information to counterintelligence, who in the process of divulging such information may not know they are aiding an investigation)
Line 220:
|url=http://www.dtic.mil/doctrine/jel/new_pubs/jp1_02.pdf
|access-date=2007-10-01
|format=PDF
|url-status=dead
|archive-url=https://web.archive.org/web/20081123014953/http://www.dtic.mil/doctrine/jel/new_pubs/jp1_02.pdf
Line 235 ⟶ 234:
| id = USAFCSC-Imbus-2002
| url = http://www.au.af.mil/au/awc/awcgate/acsc/02-059.pdf
|format=PDF| access-date = 2007-11-03
}}</ref>
 
Line 251 ⟶ 250:
| id = US JP 2-0
| url = https://fas.org/irp/doddir/dod/jp2_0.pdf
| access-date = 2007-11-05|format=PDF}}</ref> restricts its primary scope to counter-HUMINT, which usually includes counter-terror. It is not always clear, under this doctrine, who is responsible for all intelligence collection threats against a military or other resource. The full scope of US military counterintelligence doctrine has been moved to a classified publication, Joint Publication (JP) 2-01.2, ''Counterintelligence and Human Intelligence Support to Joint Operations''.
 
More specific countermeasures against intelligence collection disciplines are listed below
Line 424 ⟶ 423:
* Johnson, William R. ''Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer'' (2009)
*{{cite journal|last=Ginkel|first=B. van|title=Towards the intelligent use of intelligence: Quis Custodiet ipsos Custodes?|url=https://icct.nl/publication/towards-the-intelligent-use-of-intelligence-quis-custodiet-ipsos-custodes/|publisher=The International Centre for Counter-Terrorism|location=The Hague|volume=3|issue=10|date=2012}}
*{{cite book|first=Newton|last=Lee|title=Counterterrorism and Cybersecurity: Total Information Awareness (Second Edition)|url=https://www.amazon.com/Counterterrorism-Cybersecurity-Total-Information-Awareness/dp/3319172433/|publisher=Springer International Publishing Switzerland|date=2015|isbn=978-3319172439|edition=Second}}
*[https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol53no2/toward-a-theory-of-ci.html Toward a Theory of CI]